Description
In MODX Revolution before 2.5.7, an attacker might be able to trigger XSS by injecting a payload into the HTTP Host header of a request. This is exploitable only in conjunction with other issues such as Cache Poisoning.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-18010 | MODX Revolution XSS via HTTP Host header |
Github GHSA |
GHSA-p2j4-vrgx-96qg | MODX Revolution XSS via HTTP Host header |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-17T04:20:42.722Z
Reserved: 2017-05-18T00:00:00.000Z
Link: CVE-2017-9071
No data.
Status : Deferred
Published: 2017-05-18T16:29:00.283
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-9071
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA